Following the news of the DDoS attack on Dyn, Jeremiah Grossman, Chief of Security Strategy at SentinelOne and Mike Hanley, Director at Duo Labs commented below.
Jeremiah Grossman, Chief of Security Strategy at SentinelOne:
Mike Hanley, Director at Duo Labs:
“This is analogous to ransomware attacks in the healthcare sector in a number of ways – attackers use attacks that are relatively cheap and most likely to force payment of ransom (or force some other change in the victim’s behaviour) in exchange for ceasing the attack. In more traditional hospital ransomware attacks, attacks are successful because devices are often relatively less secure and the victims cannot tolerate outages of systems used to provide life-saving services. In this case, attackers are leveraging the low cost of subverting poorly secured IoT devices (connected cameras, etc.) at scale and hammering their targets with traffic rates we’ve not previously seen before. Attacks on DNS providers are particularly damaging given that DNS is so critical to how we navigate the Internet today. This is part of the cost to the security of the Internet when devices are shipped to millions of consumers after little or no attention to security during their development and no promise for timely delivery of security updates.”
The opinions expressed in this article belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.